General

  • Target

    4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38

  • Size

    1.3MB

  • MD5

    9513f9fa5a9f4b1358abfa403a1b37a7

  • SHA1

    0677e59469610f0e1d9fb4f55aefed4a1303b6c6

  • SHA256

    4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38

  • SHA512

    818fe95b381cecc46fa81df150c38b8102a27657e177d170aa1f1e4c326d663bf403fe0cd81f5ba2e2277cfc67e7317d46bd4bd3ee674ff21d32efc061b08145

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4233d7b8bc5b1af8c5dc0807d05378a9f1f3ac6b5810c2128705e58ce2dcbd38
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections